main.yml 1.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
  1. ---
  2. - name: Install unattended-upgrades
  3. apt:
  4. name: unattended-upgrades
  5. state: present
  6. - name: Create custom APT automatic timer directory
  7. file:
  8. state: directory
  9. path: /etc/systemd/system/apt-daily-upgrade.timer.d
  10. owner: root
  11. group: root
  12. mode: '0755'
  13. - name: Ensure APT auto installs updates at {{ apt_update_time }}
  14. template:
  15. src: time.conf.j2
  16. dest: /etc/systemd/system/apt-daily-upgrade.timer.d/time.conf
  17. owner: root
  18. group: root
  19. mode: '0644'
  20. notify: daemon reload
  21. - name: Enable unattended upgrades in debconf
  22. debconf:
  23. name: 'unattended-upgrades'
  24. question: 'unattended-upgrades/enable_auto_updates'
  25. vtype: 'boolean'
  26. value: 'true'
  27. - name: Copy default config for local changes
  28. copy:
  29. src: /etc/apt/apt.conf.d/50unattended-upgrades
  30. dest: /etc/apt/apt.conf.d/52unattended-upgrades-local
  31. owner: root
  32. group: root
  33. mode: '0644'
  34. remote_src: True
  35. - name: Configure auto reboots for unattended upgrades
  36. ansible.builtin.lineinfile:
  37. path: /etc/apt/apt.conf.d/52unattended-upgrades-local
  38. regexp: 'Unattended-Upgrade::Automatic-Reboot'
  39. line: 'Unattended-Upgrade::Automatic-Reboot "true";'
  40. - name: Enable regular updates for unattended upgrades
  41. ansible.builtin.lineinfile:
  42. path: /etc/apt/apt.conf.d/52unattended-upgrades-local
  43. regexp: 'origin=Debian,codename=\$\{distro_codename\}-updates'
  44. line: ' "origin=Debian,codename=${distro_codename}-updates";'